Type of Attack Indicators

Type of Attack Indicators

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

CPT 209 Chapter 1 Did You Know

CPT 209 Chapter 1 Did You Know

University - Professional Development

14 Qs

Port Scanning

Port Scanning

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Week 2

Week 2

Professional Development

11 Qs

Quiz

Quiz

Professional Development

10 Qs

DST07 - Day 2 quiz

DST07 - Day 2 quiz

Professional Development

10 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

15 Qs

Type of Attack Indicators

Type of Attack Indicators

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Usama Yehia Ibrahim

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A disgruntled administrator is fired for negligence at your organization. Thirty days later, your organization’s internal file server and backup server crash at exactly the same time. Examining the servers, you determine that critical operating system files were deleted from both systems. If the disgruntled administrator was responsible for administering those servers during her employment, this is most likely an example of what kind of malware?

Crypto-malware

Trojan

Worm

Logic bomb

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A colleague has been urging you to download a new animated screensaver he has been using for several weeks. While he is showing you the program, the cursor on his screen moves on its own and a command prompt window opens and quickly closes. You can’t tell what if anything was displayed in that command prompt window. Your colleague says, “It’s been doing that for a while, but it’s no big deal.” Based on what you’ve seen, you suspect the animated screensaver is really what type of malware?

A worm

A trojan

Ransomware

Spyware

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Several desktops in your organization are displaying a red screen with the message “Your files have been encrypted. Pay 1 bitcoin to recover them.” These desktops have most likely been affected by what type of malware?

Spyware

Spraying

Ransomware

Crypto-malware

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

While port-scanning your network for unauthorized systems, you notice one of your file servers has TCP port 31337 open. When you connect to the port with the security tool netcat, you see a prompt that reads, “Enter password for access:”. Your server may be infected with what type of malware?

PUP

Fileless virus

Backdoor

Man in the middle attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

While port-scanning your network for unauthorized systems, you notice one of your file servers has TCP port 61337 open. When you use Wireshark and examine the packets, you see encrypted traffic, in single packets, going back and forth every five minutes. The external connection is a server outside of your organization. What is this connection?

Command and control

Backdoor

External backup location

Remote login

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user in your organization is having issues with her laptop. Every time she opens a web browser, she sees different pop-up ads every few minutes. It doesn’t seem to matter which websites are being visited—the pop-ups still appear. What type of attack does this sound like?

A potentially unwanted program (PUP)

Ransomware

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Users at your organization are complaining about slow systems. Examining several of them, you see that CPU utilization is extremely high and a process called “btmine” is running on each of the affected systems. You also notice each of the affected systems is communicating with an IP address outside your country on UDP port 43232. If you disconnect the network connections on the affected systems, the CPU utilization drops significantly. Based on what you’ve observed, you suspect these systems are infected with what type of malware?

Rainbow tables

Crypto-malware

Dictionary

Hybrid attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?